[Bug 211962] bxe driver queue soft hangs and flooding tx_soft_errors

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=211962

Kubilay Kocak  changed:

   What|Removed |Added

 Status|New |Open
   Keywords||needs-qa
  Flags||mfc-stable9?,
   ||mfc-stable10?,
   ||mfc-stable11?

--- Comment #3 from Kubilay Kocak  ---
Thank you Matt. Can you make those committers aware of this issue if you
haven't already so they can assign it to themselves and coordinate it through
MFC's and release engineering (if it applies to 11.0-RELEASE)

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 128030] [ipsec] Enable IPSec in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=128030

geezabiscu...@hotmail.com changed:

   What|Removed |Added

 CC||geezabiscu...@hotmail.com

--- Comment #20 from geezabiscu...@hotmail.com ---
I'm not sure if this is would require a separate request but I'd like to see
IPSEC_NAT_T enabled in the GENERIC kernel also. I use my laptop as a mobile
IPSEC client and have to deal with connecting through natted IPs. Currently I
need to run a custom kernel just to add IPSEC and IPSEC_NAT_T support and it
makes keeping my system up to date somewhat cumbersome.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 128030] [ipsec] Enable IPSec in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=128030

Kubilay Kocak  changed:

   What|Removed |Added

  Flags||mfc-stable11?
 Status|Open|In Progress

--- Comment #21 from Kubilay Kocak  ---
(In reply to geezabiscuit2 from comment #20)

This issue has already been committed to head and is pending MFC (see comment
13, comment 14, comment 16)

I'd suggest create a separate issue with a similar summary (replacing IPSec
with IPSEC_NAT_T of course) and add this issue's URL to the new issues "See
Also:" field

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 128030] [ipsec] Enable IPSec in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=128030

k...@denninger.net changed:

   What|Removed |Added

 CC||k...@denninger.net

--- Comment #22 from k...@denninger.net ---
(In reply to geezabiscuit2 from comment #20)

While we're on the topic...

options IPSEC_FILTERTUNNEL

ought to be in GENERIC as well 
and, arguably

device enc


StrongSwan currently requires (even in 11.x) a custom kernel because these two
entries are not in GENERIC.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 128030] [ipsec] Enable IPSec in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=128030

--- Comment #23 from Sydney Meyer  ---
+1 for IPSEC_NAT_T in GENERIC.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: svn commit: r304313 - head/sys/net

2016-08-20 Thread Adrian Chadd
On 17 August 2016 at 13:21, Andrey V. Elsukov  wrote:
> Author: ae
> Date: Wed Aug 17 20:21:33 2016
> New Revision: 304313
> URL: https://svnweb.freebsd.org/changeset/base/304313
>
> Log:
>   Teach netisr_get_cpuid() to limit a given value to supported by netisr.
>   Use netisr_get_cpuid() in netisr_select_cpuid() to limit cpuid value
>   returned by protocol to be sure that it is not greather than nws_count.
>
>   PR:   211836
>   Reviewed by:  adrian
>   MFC after:3 days
>
> Modified:
>   head/sys/net/if_epair.c
>   head/sys/net/netisr.c
>
> Modified: head/sys/net/if_epair.c
> ==
> --- head/sys/net/if_epair.c Wed Aug 17 19:43:45 2016(r304312)
> +++ head/sys/net/if_epair.c Wed Aug 17 20:21:33 2016(r304313)
> @@ -807,9 +807,9 @@ epair_clone_create(struct if_clone *ifc,
>  * cache locality but we can at least allow parallelism.
>  */
> sca->cpuid =
> -   netisr_get_cpuid(sca->ifp->if_index % netisr_get_cpucount());
> +   netisr_get_cpuid(sca->ifp->if_index);
> scb->cpuid =
> -   netisr_get_cpuid(scb->ifp->if_index % netisr_get_cpucount());
> +   netisr_get_cpuid(scb->ifp->if_index);
>
> /* Initialise pseudo media types. */
> ifmedia_init(&sca->media, 0, epair_media_change, epair_media_status);
>
> Modified: head/sys/net/netisr.c
> ==
> --- head/sys/net/netisr.c   Wed Aug 17 19:43:45 2016(r304312)
> +++ head/sys/net/netisr.c   Wed Aug 17 20:21:33 2016(r304313)
> @@ -272,10 +272,7 @@ u_int
>  netisr_get_cpuid(u_int cpunumber)
>  {
>
> -   KASSERT(cpunumber < nws_count, ("%s: %u > %u", __func__, cpunumber,
> -   nws_count));
> -
> -   return (nws_array[cpunumber]);
> +   return (nws_array[cpunumber % nws_count]);
>  }
>
>  /*
> @@ -810,10 +807,12 @@ netisr_select_cpuid(struct netisr_proto
>  * dispatch.  In the queued case, fall back on the SOURCE
>  * policy.
>  */
> -   if (*cpuidp != NETISR_CPUID_NONE)
> +   if (*cpuidp != NETISR_CPUID_NONE) {
> +   *cpuidp = netisr_get_cpuid(*cpuidp);
> return (m);
> +   }
> if (dispatch_policy == NETISR_DISPATCH_HYBRID) {
> -   *cpuidp = curcpu;
> +   *cpuidp = netisr_get_cpuid(curcpu);
> return (m);
> }
> policy = NETISR_POLICY_SOURCE;
>

I wonder if the right-er thing to do here is to allow the cpuid to be
whatever it needs to be, but limit the cpuid lookups when it resolves
to a netisr array.

that'd mean the hybrid model would still return the current CPU up to
the max CPU id, but anything trying to queue into a netisr would not
overflow the netisr queue count.

Thoughts?


-a
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 128030] [ipsec] Enable IPSec in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=128030

--- Comment #24 from Darryn Nicol  ---
I've created a new request to add IPSEC_NAT_T:

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=212018

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 128030] [ipsec] Enable IPSec in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=128030

Bjoern A. Zeeb  changed:

   What|Removed |Added

 CC||b...@freebsd.org

--- Comment #25 from Bjoern A. Zeeb  ---
(In reply to karl from comment #22)

The kernel option IPSEC_FILTERTUNNEL should be removed ... as indicated in
commit .. uhm .. https://svnweb.freebsd.org/base?view=revision&revision=192648 
;  my bad;  should have done that 6 years ago ...  please use the loader
tunable;  no need to compile a different kernel for this anymore.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 128030] [ipsec] Enable IPSec in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=128030

--- Comment #26 from Bjoern A. Zeeb  ---
(In reply to Bjoern A. Zeeb from comment #25)

Whoops. make that a sysctl (he who can read his own commit messages ...)  so
you can change it at runtime;  even better;  no need to reboot or compile a
kernel ;-)

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


Re: iwn(4) association issues in 11-Stable (and maybe RC)

2016-08-20 Thread Adrian Chadd
Hi,

There have been some changes to the scan code and iwn scan timeout code.
Andriy may have some ideas.

Thanks!

A

On Aug 19, 2016 3:48 PM, "Kevin Oberman"  wrote:

> Lately I have had serious issues with my system successfully associating.
> These were not present with 10.3.
>
> > uname -a
> FreeBSD rogue 11.0-BETA4 FreeBSD 11.0-BETA4 #1 r303806: Sat Aug  6 18:50:50
> PDT 2016 root@rogue:/usr/obj/usr/src/sys/GENERIC.4BSD  amd64
>
> iwn0@pci0:3:0:0:class=0x028000 card=0x13118086 chip=0x00858086
> rev=0x34
> hdr=0x00
> cap 01[c8] = powerspec 3  supports D0 D3  current D0
> cap 05[d0] = MSI supports 1 message, 64 bit enabled with 1 message
> cap 10[e0] = PCI-Express 1 endpoint max data 128(128) FLR RO NS
>  link x1(x1) speed 2.5(2.5) ASPM L1(L0s/L1)
> ecap 0001[100] = AER 1 0 fatal 0 non-fatal 0 corrected
> ecap 0003[140] = Serial 1 a088b4c6ad28
>
> Once associated, it works fine, but a dropped association is often not
> re-established and the network fails to come up at boot time. Kernel is
> GENERIC except the 4BSD scheduler.
>
> I've been using a mobile hotspot this week during travels and it has become
> a real pain. With  lot of patience and many "netif restart wlan0"
> operations, it will come up, but it can be painful. Here is what I see in
> messages:
> Aug 19 00:13:52 rogue kernel: wlan0: Ethernet address: a0:88:b4:c6:ad:28
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
> Aug 19 00:13:52 rogue kernel: ipfw2 (+ipv6) initialized, divert loadable,
> nat loadable, default to deny, logging disabled
> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:14:17 rogue dhclient[362]: send_packet: Network is down
> Aug 19 00:14:37 rogue dhclient[362]: send_packet: Network is down
> Aug 19 00:14:39 rogue wpa_supplicant[350]: wlan0: CTRL-EVENT-TERMINATING
> Aug 19 00:14:39 rogue dhclient[362]: connection closed
> Aug 19 00:14:39 rogue dhclient[362]: exiting.
> Aug 19 00:14:39 rogue rtsold[873]:  interface
> wlan0 removed
> Aug 19 00:14:39 rogue kernel: wlan0: Ethernet address: a0:88:b4:c6:ad:28
> Aug 19 00:14:39 rogue wpa_supplicant[1621]: Successfully initialized
> wpa_supplicant
> Aug 19 00:14:39 rogue wpa_supplicant[1633]: Successfully initialized
> wpa_supplicant
> Aug 19 00:14:39 rogue root: /etc/rc.d/wpa_supplicant: WARNING: failed to
> start wpa_supplicant
> Aug 19 00:14:39 rogue kernel: iwn0: iwn_read_firmware: ucode rev=0x12a80601
> Aug 19 00:14:39 rogue wpa_supplicant[1634]: ioctl[SIOCS80211, op=103,
> val=0, arg_len=128]: Operation now in progress
> Aug 19 00:14:39 rogue wpa_supplicant[1634]: wlan0: CTRL-EVENT-SCAN-FAILED
> ret=-1 retry=1
> Aug 19 00:14:40 rogue wpa_supplicant[1634]: ioctl[SIOCS80211, op=103,
> val=0, arg_len=128]: Operation now in progress
> Aug 19 00:14:40 rogue wpa_supplicant[1634]: wlan0: CTRL-EVENT-SCAN-FAILED
> ret=-1 retry=1
> Aug 19 00:14:41 rogue wpa_supplicant[1634]: ioctl[SIOCS80211, op=103,
> val=0, ar

Re: iwn(4) association issues in 11-Stable (and maybe RC)

2016-08-20 Thread Kevin Oberman
On Aug 20, 2016 6:29 PM, "Adrian Chadd"  wrote:
>
> Hi,
>
> There have been some changes to the scan code and iwn scan timeout code.
Andriy may have some ideas.
>
> Thanks!
>
> A

One more note. There are multiple "link up" messages in the log. The LED
never stopped the flashing which indicates that it is not associated. If I
did "ifconfig wlan0 list aps", my hot spot was listed, but a simple
"ifconfig wlan0" never showed an association. Usually a few "netif
restart"s will get it to work, but sometimes it seems hopeless. It seems
worse when my phone is the hot spot than with my home router.
>
>
> On Aug 19, 2016 3:48 PM, "Kevin Oberman"  wrote:
>>
>> Lately I have had serious issues with my system successfully associating.
>> These were not present with 10.3.
>>
>> > uname -a
>> FreeBSD rogue 11.0-BETA4 FreeBSD 11.0-BETA4 #1 r303806: Sat Aug  6
18:50:50
>> PDT 2016 root@rogue:/usr/obj/usr/src/sys/GENERIC.4BSD  amd64
>>
>> iwn0@pci0:3:0:0:class=0x028000 card=0x13118086 chip=0x00858086
rev=0x34
>> hdr=0x00
>> cap 01[c8] = powerspec 3  supports D0 D3  current D0
>> cap 05[d0] = MSI supports 1 message, 64 bit enabled with 1 message
>> cap 10[e0] = PCI-Express 1 endpoint max data 128(128) FLR RO NS
>>  link x1(x1) speed 2.5(2.5) ASPM L1(L0s/L1)
>> ecap 0001[100] = AER 1 0 fatal 0 non-fatal 0 corrected
>> ecap 0003[140] = Serial 1 a088b4c6ad28
>>
>> Once associated, it works fine, but a dropped association is often not
>> re-established and the network fails to come up at boot time. Kernel is
>> GENERIC except the 4BSD scheduler.
>>
>> I've been using a mobile hotspot this week during travels and it has
become
>> a real pain. With  lot of patience and many "netif restart wlan0"
>> operations, it will come up, but it can be painful. Here is what I see in
>> messages:
>> Aug 19 00:13:52 rogue kernel: wlan0: Ethernet address: a0:88:b4:c6:ad:28
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
>> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
>> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
>> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
>> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
>> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
>> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
>> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to UP
>> Aug 19 00:13:52 rogue kernel: ipfw2 (+ipv6) initialized, divert loadable,
>> nat loadable, default to deny, logging disabled
>> Aug 19 00:13:52 rogue kernel: wlan0: link state changed to DOWN
>> Aug 19 00:13:52 rogue kernel: iwn0: scan timeout
>> Aug 19 00:13:52 rogue kernel: iwn0: iwn_read_firmware: ucode
rev=0x12a80601
>> Aug 19 00:14:17 rogue dhclient[362]: send_packet: Network is down
>> Aug 19 00:14:37 rogue dhclient[362]: send_packet: Network is down
>> Aug 19 00:14:39 rogue wpa_supplicant[350]: wlan0: CTRL-EVENT-TERMINATING
>> Aug 19 00:14:39 rogue dhclient[362]: connection closed
>> Aug 19 00:14:39 rogue dhclient[362]: exiting.
>> Aug 19 00:14:39 rogue rtsold[873]:  interface
>> wlan0 removed
>> Aug 19 00:14:39 rogue kernel: wlan0: Ethernet address: a0:88:b4:c6:ad:28
>> Aug 19 00:14:39 rogue wpa_supplicant[1621]: Successfully initialized
>> wpa_supplicant
>> Aug 19 00:14:39 rogue wpa_supplicant[1633]: Successfully initialized
>> wpa_supplicant
>> Aug 19 00:14:39 rogue root: /etc/rc.d/wpa_supplicant: WARNING: failed to
>> start wpa_supplicant
>> Aug 19 00:14:39 rogue kerne

Re: iwn(4) association issues in 11-Stable (and maybe RC)

2016-08-20 Thread Adrian Chadd
On 20 August 2016 at 19:02, Kevin Oberman  wrote:
> On Aug 20, 2016 6:29 PM, "Adrian Chadd"  wrote:
>>
>> Hi,
>>
>> There have been some changes to the scan code and iwn scan timeout code.
>> Andriy may have some ideas.
>>
>> Thanks!
>>
>> A
>
> One more note. There are multiple "link up" messages in the log. The LED
> never stopped the flashing which indicates that it is not associated. If I
> did "ifconfig wlan0 list aps", my hot spot was listed, but a simple
> "ifconfig wlan0" never showed an association. Usually a few "netif restart"s
> will get it to work, but sometimes it seems hopeless. It seems worse when my
> phone is the hot spot than with my home router.

I've not seen this happen with any of the iwn hardware that I have,
but wifi is odd like that.

it looks like wpa_supplicant is started twice. Is that happening? That
(sigh) still may be making things unhappy.



-adrian
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 212018] [ipsec] [request] Enable IPSEC_NAT_T in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=212018

Mark Linimon  changed:

   What|Removed |Added

Summary|[ipsec] Enable IPSEC_NAT_T  |[ipsec] [request] Enable
   |in GENERIC kernel   |IPSEC_NAT_T in GENERIC
   |configuration   |kernel configuration
   Assignee|freebsd-b...@freebsd.org|freebsd-net@FreeBSD.org

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


[Bug 212018] Enable IPSEC_NAT_T in GENERIC kernel configuration

2016-08-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=212018

Kubilay Kocak  changed:

   What|Removed |Added

   Keywords||feature, needs-patch
  Flags||mfc-stable10?,
   ||mfc-stable11?
Summary|[ipsec] [request] Enable|Enable IPSEC_NAT_T in
   |IPSEC_NAT_T in GENERIC  |GENERIC kernel
   |kernel configuration|configuration
 Status|New |Open

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"